North Korean masterminds were behind WannaCry cyber attack, says White House

North Korea attack: The WannaCry bug
AP
Mark Blunden @_MarkBlunden19 December 2017

A cyber-attack which paralysed NHS computer networks and led to the cancellation of almost 20,000 medical appointments was masterminded from North Korea, a White House expert said today.

Tom Bossert, President Trump’s homeland security adviser, said the Pyongyang was “directly responsible” for the ransomware attack in May which crippled computers around the world.

Bossert told the Wall Street Journal: “After careful investigation, the US today publicly attributes the massive WannaCry cyber-attack to Kim Jong Un’s regime. The attack spread indiscriminately across the world in May.

“It encrypted and rendered useless hundreds of thousands of computers in hospitals, schools, businesses and homes.

“While victims received ransom demands, paying did not unlock their computers. It was cowardly, costly and careless.

Kim Jong Un - pictured watching a nuclear test launch - was behind the WannaCry attack

“The attack was widespread and cost billions, and North Korea is directly responsible.”

The UK and Microsoft reached similar conclusions in their analysis of WannaCry with Home Office minister Ben Wallace saying in October the government believed “quite strongly” that North Korea was the prime suspect.

The attack began on May 12 and infected machines 81 health trusts across England, plus computers at about 600 GP surgeries.

Kim Jong Un: The proud dictator was recently pictured with his newly-developed intercontinental rocket
AP

Hard drives and databases were locked up by hackers demanded payment in the digital cryptocurrency Bitcoin to unscramble them.

A National Audit Office report found that almost 19,500 medical appointments, including 139 potential cancer referrals, were estimated to have been cancelled.

Five hospitals had to divert ambulances away from their wards after being locked out.

19,500 medical appointments, including 139 potential cancer referrals
AP

The report found the attack could have been prevented if “basic IT security” measures had been taken.

All infected machines were running computer systems - the majority Windows 7 - that had not been updated to secure them against such attacks.

Government offices in Russia, Spain, and several other countries were disrupted, as were Asian universities, Germany’s national railway and global companies such as automakers Nissan and Renault.

The attack was brought to a halt by 23-year-old security researcher Marcus Hutchins from Devon who discovered the malware’s author had embedded a “kill switch” in the code, which he was able to trip.

Create a FREE account to continue reading

eros

Registration is a free and easy way to support our journalism.

Join our community where you can: comment on stories; sign up to newsletters; enter competitions and access content on our app.

Your email address

Must be at least 6 characters, include an upper and lower case character and a number

You must be at least 18 years old to create an account

* Required fields

Already have an account? SIGN IN

By clicking Create Account you confirm that your data has been entered correctly and you have read and agree to our Terms of use , Cookie policy and Privacy policy .

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Thank you for registering

Please refresh the page or navigate to another page on the site to be automatically logged in